Efficient and privacy-preserving butterfly counting on encrypted bipartite graphs

被引:0
|
作者
机构
[1] Pang, Xin
[2] 1,Chen, Lanxiang
基金
中国国家自然科学基金;
关键词
Ciphertext - Encryption algorithms;
D O I
10.1016/j.jisa.2024.103952
中图分类号
学科分类号
摘要
Bipartite graphs have numerous real-world applications, with the butterfly motif serving as a key higher-order structure that models cohesion within these graphs. Analyzing butterflies is crucial for a comprehensive understanding of networks, making butterfly counting a significant focus for researchers. In recent years, various efficient methods for exact butterfly counting, along with sampling-based approximate schemes, have been proposed for plaintext bipartite graphs. However, these methods often overlook data privacy concerns, which are critical in real-world scenarios such as doctor–patient and user–item relationships. Additionally, traditional encryption methods do not work due to the nature of graph structures. To tackle these challenges, we propose two schemes for exact butterfly counting on encrypted bipartite graphs (EB-BFC), enabling butterfly counting for specific vertices or edges to protect privacy of butterfly counting. Firstly, we demonstrate how structured encryption techniques could be used to encrypt the bipartite graph and construct a secure index, resulting in the efficient, privacy-preserving scheme EB-BFC1. Secondly, to ensure vertex data privacy, we propose a butterfly counting scheme based on Private Set Intersection, EB-BFC2. Finally, we demonstrate the security and efficiency of our proposed schemes through theoretical proofs and experiments on real-world datasets. © 2024 Elsevier Ltd
引用
下载
收藏
相关论文
共 50 条
  • [31] Efficient and Privacy-Preserving Spatial Keyword Similarity Query Over Encrypted Data
    Zhang, Songnian
    Ray, Suprio
    Lu, Rongxing
    Guan, Yunguo
    Zheng, Yandong
    Shao, Jun
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 3770 - 3786
  • [32] A Privacy-Preserving Solution for the Bipartite Ranking Problem
    Faramarzi, Noushin Salek
    Ayday, Erman
    Guvenir, H. Altay
    2016 15TH IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS (ICMLA 2016), 2016, : 375 - 380
  • [33] Privacy-Preserving Bipartite Consensus on Signed Networks
    Zhang, Jing
    Lu, Jianquan
    Chen, Xiangyong
    Zhong, Jie
    IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2024, 11 (02): : 696 - 704
  • [34] PRkNN: Efficient and Privacy-Preserving Reverse kNN Query Over Encrypted Data
    Zheng, Yandong
    Lu, Rongxing
    Zhang, Songnian
    Guan, Yunguo
    Wang, Fengwei
    Shao, Jun
    Zhu, Hui
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2023, 20 (05) : 4387 - 4402
  • [35] Accelerated butterfly counting with vertex priority on bipartite graphs
    Kai Wang
    Xuemin Lin
    Lu Qin
    Wenjie Zhang
    Ying Zhang
    The VLDB Journal, 2023, 32 : 257 - 281
  • [36] Butterfly counting and bitruss decomposition on uncertain bipartite graphs
    Zhou, Alexander
    Wang, Yue
    Chen, Lei
    VLDB JOURNAL, 2023, 32 (05): : 1013 - 1036
  • [37] Butterfly counting and bitruss decomposition on uncertain bipartite graphs
    Alexander Zhou
    Yue Wang
    Lei Chen
    The VLDB Journal, 2023, 32 : 1013 - 1036
  • [38] Accelerated butterfly counting with vertex priority on bipartite graphs
    Wang, Kai
    Lin, Xuemin
    Qin, Lu
    Zhang, Wenjie
    Zhang, Ying
    VLDB JOURNAL, 2023, 32 (02): : 257 - 281
  • [39] Privacy-preserving authentication of trees and graphs
    Ashish Kundu
    Elisa Bertino
    International Journal of Information Security, 2013, 12 : 467 - 494
  • [40] Privacy-preserving authentication of trees and graphs
    Kundu, Ashish
    Bertino, Elisa
    INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2013, 12 (06) : 467 - 494